/ Most Viewed

Restraining Order Filed by US States’ Attorneys in the Final Hours of IANA Transition

With less than 24 hours to go before the historic contractual relationship between the US government and ICANN is set to expire, a motion hearing is expected to be held today based on a lawsuit filed in federal court in Texas by four states' attorneys general which could lead to NTIA facing the possibility of a temporary injunction. more

Is 47 USC 230(c) an Immunity or an Affirmative Defense (Does it Matter?)

Procedure matters. It matters whether a defendant can dispose of a litigation right out of the gate, or whether the defendant must suffer the slings and arrows of discovery, motions, and trial before presenting a successful defense. Procedurally, once a litigation has been initiated, defendant has a chance to say, "hey, wait a minute, there isn't actually a cause of action here." It's like someone suing me for being tall. Well, yeah, but there is no recognized cause of action against being tall. more

Mobile Infrastructure Running Out of Steam

The enormous growth in mobile usage, doubling each year, is set to continue for several years in a row. According to Ericsson, by 2020 mobile operators will need to provide one thousand times the capacity that was required in 2010. Our assessment at BuddeComm is that the mobile industry has already fallen behind in delivering the capacity needed today, let alone coping with the enormous growth ahead; and that this situation will deteriorate before it improves. more

SpaceX Starlink Beta, Phase Two

According to an email, Starlink has moved into the second phase of its beta program, nicknamed the "better than nothing beta," which feels a bit like monopoly hubris to me. It may be better than nothing, but it is not as good as the initial beta, which was free. Participants will pay $99 per month for the service and pay $499 for a terminal, including a tripod and WiFi router. I wonder what the difference is between these "beta testers" and "customers." more

Microsoft Warns Extortion Drives Majority of Attacks Amid AI Escalation, Identity Collapse, and Global Fragmentation

Microsoft's latest Digital Defense Report reveals how cybercriminals and nation-states are rapidly adopting AI to enhance attacks. With identity-based threats soaring, the company urges urgent modernization of security systems and global cooperation. more

Summary of the Registration Operations Association Workshop

The first Registration Operations Association Workshop took place on Thursday, 16 October 2014, at the Los Angeles Hyatt Regency Century Plaza Hotel. I'd like to thank the 64 people that took the time to attend and participate in the discussion, both in-person and remote. I started the workshop with an introduction to some of the technical challenges being faced by the domain registration industry. more

Thinking Carefully About New gTLD Objections: String Confusion (Part 1 of 4)

Since speaking last fall on community-based TLDs at the New gTLD Summit in Los Angeles, I have been asked a number of times to provide input on the objections ICANN allows in its New gTLD Applicant Guidebook ("AGB" or simply the "Guidebook"). As the March 13 deadline approaches, I now present the first of a series of four spotlight articles on the subject -- one on each of the four permissible grounds for objection. more

Internet Governance and the Universal Declaration of Human Rights, Part 2: Article 1-5

Digital governance, like all governance, needs to be founded in guiding principles from which all policy making is derived. There are no more fundamental principles to guide our policy making than the Universal Declaration of Human Rights, (UDHR). This article is Part 2 of a series of articles exploring the application of the UDHR to rights issues in the cyberspaces of the Internet ecosystem. The previous article in the series explores the foundations of the UDHR. more

Some Thought on the Paper: Practical Challenge-Response for DNS

Because the speed of DNS is so important to the performance of any connection on the 'net, a lot of thought goes into making DNS servers fast, including optimized software that can respond to queries in milliseconds, and connecting DNS servers to the 'net through high bandwidth links. To set the stage for massive DDoS attacks based in the DNS system, add a third point: DNS responses tend to be much larger than DNS queries. more

Email More Secure Today Than Two Years Ago, Research Suggests

Google in partnership with the University of Michigan and the University of Illinois, has published the results of a multi-year study that measured how email security has evolved since 2013. Although Gmail was the foundation of the research, insights from the study are believed to be applicable to email more broadly. more

Modest Proposals for gTLD Profits

When does a non-profit organization become a profit-making one? This and similarly fundamental questions about ICANN's institutional character are raised by the high probability that the gTLD project will produce profits for ICANN. How much money those profits will amount to remains in question, but it is increasingly difficult for ICANN to say that there will be no profit at all. more

Assigning 32-bit ASNs

With 16-bit Autonomous System Numbers (ASNs), 65,536 unique numbers are possible. Just like 32-bit IP addresses, these 16-bit ASNs are becoming a scarce resource. Therefore, in 2007 the Internet Engineering Task Force (IETF) developed a new format, 32-bit ASNs (RFC 4893), which increases the supply of ASNs to four billion. more

EU Ruling on Google Ad Keywords: Implications for Brand Owners

In a landmark judgment issued this past Tuesday, the European Court of Justice (ECJ) ruled that Google is not liable for trademark infringement when an advertiser purchases a keyword based on a competitor's trademark to trigger a search ad, so long as it removes infringing ads promptly when notified by brand owners. However, and this is critical, individual advertisers could be held liable if ads triggered by a keyword involving a competitor's trademark are found to confuse consumers. So, what qualifies as consumer confusion? more

5th ITAC OECD Newsletter: Internet Governance, WSIS+10, IoT, Cybersecurity, Trust, Standards…

Today the Internet Technical Advisory Committee (ITAC) to the OECD published the fifth edition of its newsletter. The ITAC was created in 2009 following the OECD's Seoul Ministerial with the objective to provide Internet technical and policy expertise to the work of the OECD on Internet-related issues. This informal group is coordinated by the Internet Society and currently counts 28 members active in domains such as open Internet/Web standards development, interconnection, IP addressing, security or privacy. more

How Far Will U.S. Regulators Bend to AT&T and Verizon?

Recent events relating to the network plans of AT&T and Verizon are extraordinary: it appears that the commercial and lobbying clout of two major telcos is determining the telecom services which their customers can receive, the technology they will receive them with, and whether they will receive them at all. Already a large number of states have agreed to dismantle Carrier of Last Resort (COLR) obligations on them, while the FCC itself is being advised to change the rules to suit the business interest of the telcos. more